groups_local.py 18 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478
  1. # -*- coding: utf-8 -*-
  2. # Copyright 2017 Vector Creations Ltd
  3. # Copyright 2018 New Vector Ltd
  4. #
  5. # Licensed under the Apache License, Version 2.0 (the "License");
  6. # you may not use this file except in compliance with the License.
  7. # You may obtain a copy of the License at
  8. #
  9. # http://www.apache.org/licenses/LICENSE-2.0
  10. #
  11. # Unless required by applicable law or agreed to in writing, software
  12. # distributed under the License is distributed on an "AS IS" BASIS,
  13. # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  14. # See the License for the specific language governing permissions and
  15. # limitations under the License.
  16. import logging
  17. from six import iteritems
  18. from twisted.internet import defer
  19. from synapse.api.errors import HttpResponseException, RequestSendFailed, SynapseError
  20. from synapse.types import get_domain_from_id
  21. logger = logging.getLogger(__name__)
  22. def _create_rerouter(func_name):
  23. """Returns a function that looks at the group id and calls the function
  24. on federation or the local group server if the group is local
  25. """
  26. def f(self, group_id, *args, **kwargs):
  27. if self.is_mine_id(group_id):
  28. return getattr(self.groups_server_handler, func_name)(
  29. group_id, *args, **kwargs
  30. )
  31. else:
  32. destination = get_domain_from_id(group_id)
  33. d = getattr(self.transport_client, func_name)(
  34. destination, group_id, *args, **kwargs
  35. )
  36. # Capture errors returned by the remote homeserver and
  37. # re-throw specific errors as SynapseErrors. This is so
  38. # when the remote end responds with things like 403 Not
  39. # In Group, we can communicate that to the client instead
  40. # of a 500.
  41. def http_response_errback(failure):
  42. failure.trap(HttpResponseException)
  43. e = failure.value
  44. raise e.to_synapse_error()
  45. def request_failed_errback(failure):
  46. failure.trap(RequestSendFailed)
  47. raise SynapseError(502, "Failed to contact group server")
  48. d.addErrback(http_response_errback)
  49. d.addErrback(request_failed_errback)
  50. return d
  51. return f
  52. class GroupsLocalHandler(object):
  53. def __init__(self, hs):
  54. self.hs = hs
  55. self.store = hs.get_datastore()
  56. self.room_list_handler = hs.get_room_list_handler()
  57. self.groups_server_handler = hs.get_groups_server_handler()
  58. self.transport_client = hs.get_federation_transport_client()
  59. self.auth = hs.get_auth()
  60. self.clock = hs.get_clock()
  61. self.keyring = hs.get_keyring()
  62. self.is_mine_id = hs.is_mine_id
  63. self.signing_key = hs.config.signing_key[0]
  64. self.server_name = hs.hostname
  65. self.notifier = hs.get_notifier()
  66. self.attestations = hs.get_groups_attestation_signing()
  67. self.profile_handler = hs.get_profile_handler()
  68. # Ensure attestations get renewed
  69. hs.get_groups_attestation_renewer()
  70. # The following functions merely route the query to the local groups server
  71. # or federation depending on if the group is local or remote
  72. get_group_profile = _create_rerouter("get_group_profile")
  73. update_group_profile = _create_rerouter("update_group_profile")
  74. get_rooms_in_group = _create_rerouter("get_rooms_in_group")
  75. get_invited_users_in_group = _create_rerouter("get_invited_users_in_group")
  76. add_room_to_group = _create_rerouter("add_room_to_group")
  77. update_room_in_group = _create_rerouter("update_room_in_group")
  78. remove_room_from_group = _create_rerouter("remove_room_from_group")
  79. update_group_summary_room = _create_rerouter("update_group_summary_room")
  80. delete_group_summary_room = _create_rerouter("delete_group_summary_room")
  81. update_group_category = _create_rerouter("update_group_category")
  82. delete_group_category = _create_rerouter("delete_group_category")
  83. get_group_category = _create_rerouter("get_group_category")
  84. get_group_categories = _create_rerouter("get_group_categories")
  85. update_group_summary_user = _create_rerouter("update_group_summary_user")
  86. delete_group_summary_user = _create_rerouter("delete_group_summary_user")
  87. update_group_role = _create_rerouter("update_group_role")
  88. delete_group_role = _create_rerouter("delete_group_role")
  89. get_group_role = _create_rerouter("get_group_role")
  90. get_group_roles = _create_rerouter("get_group_roles")
  91. set_group_join_policy = _create_rerouter("set_group_join_policy")
  92. @defer.inlineCallbacks
  93. def get_group_summary(self, group_id, requester_user_id):
  94. """Get the group summary for a group.
  95. If the group is remote we check that the users have valid attestations.
  96. """
  97. if self.is_mine_id(group_id):
  98. res = yield self.groups_server_handler.get_group_summary(
  99. group_id, requester_user_id
  100. )
  101. else:
  102. res = yield self.transport_client.get_group_summary(
  103. get_domain_from_id(group_id), group_id, requester_user_id
  104. )
  105. group_server_name = get_domain_from_id(group_id)
  106. # Loop through the users and validate the attestations.
  107. chunk = res["users_section"]["users"]
  108. valid_users = []
  109. for entry in chunk:
  110. g_user_id = entry["user_id"]
  111. attestation = entry.pop("attestation", {})
  112. try:
  113. if get_domain_from_id(g_user_id) != group_server_name:
  114. yield self.attestations.verify_attestation(
  115. attestation,
  116. group_id=group_id,
  117. user_id=g_user_id,
  118. server_name=get_domain_from_id(g_user_id),
  119. )
  120. valid_users.append(entry)
  121. except Exception as e:
  122. logger.info("Failed to verify user is in group: %s", e)
  123. res["users_section"]["users"] = valid_users
  124. res["users_section"]["users"].sort(key=lambda e: e.get("order", 0))
  125. res["rooms_section"]["rooms"].sort(key=lambda e: e.get("order", 0))
  126. # Add `is_publicised` flag to indicate whether the user has publicised their
  127. # membership of the group on their profile
  128. result = yield self.store.get_publicised_groups_for_user(requester_user_id)
  129. is_publicised = group_id in result
  130. res.setdefault("user", {})["is_publicised"] = is_publicised
  131. return res
  132. @defer.inlineCallbacks
  133. def create_group(self, group_id, user_id, content):
  134. """Create a group
  135. """
  136. logger.info("Asking to create group with ID: %r", group_id)
  137. if self.is_mine_id(group_id):
  138. res = yield self.groups_server_handler.create_group(
  139. group_id, user_id, content
  140. )
  141. local_attestation = None
  142. remote_attestation = None
  143. else:
  144. local_attestation = self.attestations.create_attestation(group_id, user_id)
  145. content["attestation"] = local_attestation
  146. content["user_profile"] = yield self.profile_handler.get_profile(user_id)
  147. res = yield self.transport_client.create_group(
  148. get_domain_from_id(group_id), group_id, user_id, content
  149. )
  150. remote_attestation = res["attestation"]
  151. yield self.attestations.verify_attestation(
  152. remote_attestation,
  153. group_id=group_id,
  154. user_id=user_id,
  155. server_name=get_domain_from_id(group_id),
  156. )
  157. is_publicised = content.get("publicise", False)
  158. token = yield self.store.register_user_group_membership(
  159. group_id,
  160. user_id,
  161. membership="join",
  162. is_admin=True,
  163. local_attestation=local_attestation,
  164. remote_attestation=remote_attestation,
  165. is_publicised=is_publicised,
  166. )
  167. self.notifier.on_new_event("groups_key", token, users=[user_id])
  168. return res
  169. @defer.inlineCallbacks
  170. def get_users_in_group(self, group_id, requester_user_id):
  171. """Get users in a group
  172. """
  173. if self.is_mine_id(group_id):
  174. res = yield self.groups_server_handler.get_users_in_group(
  175. group_id, requester_user_id
  176. )
  177. return res
  178. group_server_name = get_domain_from_id(group_id)
  179. res = yield self.transport_client.get_users_in_group(
  180. get_domain_from_id(group_id), group_id, requester_user_id
  181. )
  182. chunk = res["chunk"]
  183. valid_entries = []
  184. for entry in chunk:
  185. g_user_id = entry["user_id"]
  186. attestation = entry.pop("attestation", {})
  187. try:
  188. if get_domain_from_id(g_user_id) != group_server_name:
  189. yield self.attestations.verify_attestation(
  190. attestation,
  191. group_id=group_id,
  192. user_id=g_user_id,
  193. server_name=get_domain_from_id(g_user_id),
  194. )
  195. valid_entries.append(entry)
  196. except Exception as e:
  197. logger.info("Failed to verify user is in group: %s", e)
  198. res["chunk"] = valid_entries
  199. return res
  200. @defer.inlineCallbacks
  201. def join_group(self, group_id, user_id, content):
  202. """Request to join a group
  203. """
  204. if self.is_mine_id(group_id):
  205. yield self.groups_server_handler.join_group(group_id, user_id, content)
  206. local_attestation = None
  207. remote_attestation = None
  208. else:
  209. local_attestation = self.attestations.create_attestation(group_id, user_id)
  210. content["attestation"] = local_attestation
  211. res = yield self.transport_client.join_group(
  212. get_domain_from_id(group_id), group_id, user_id, content
  213. )
  214. remote_attestation = res["attestation"]
  215. yield self.attestations.verify_attestation(
  216. remote_attestation,
  217. group_id=group_id,
  218. user_id=user_id,
  219. server_name=get_domain_from_id(group_id),
  220. )
  221. # TODO: Check that the group is public and we're being added publically
  222. is_publicised = content.get("publicise", False)
  223. token = yield self.store.register_user_group_membership(
  224. group_id,
  225. user_id,
  226. membership="join",
  227. is_admin=False,
  228. local_attestation=local_attestation,
  229. remote_attestation=remote_attestation,
  230. is_publicised=is_publicised,
  231. )
  232. self.notifier.on_new_event("groups_key", token, users=[user_id])
  233. return {}
  234. @defer.inlineCallbacks
  235. def accept_invite(self, group_id, user_id, content):
  236. """Accept an invite to a group
  237. """
  238. if self.is_mine_id(group_id):
  239. yield self.groups_server_handler.accept_invite(group_id, user_id, content)
  240. local_attestation = None
  241. remote_attestation = None
  242. else:
  243. local_attestation = self.attestations.create_attestation(group_id, user_id)
  244. content["attestation"] = local_attestation
  245. res = yield self.transport_client.accept_group_invite(
  246. get_domain_from_id(group_id), group_id, user_id, content
  247. )
  248. remote_attestation = res["attestation"]
  249. yield self.attestations.verify_attestation(
  250. remote_attestation,
  251. group_id=group_id,
  252. user_id=user_id,
  253. server_name=get_domain_from_id(group_id),
  254. )
  255. # TODO: Check that the group is public and we're being added publically
  256. is_publicised = content.get("publicise", False)
  257. token = yield self.store.register_user_group_membership(
  258. group_id,
  259. user_id,
  260. membership="join",
  261. is_admin=False,
  262. local_attestation=local_attestation,
  263. remote_attestation=remote_attestation,
  264. is_publicised=is_publicised,
  265. )
  266. self.notifier.on_new_event("groups_key", token, users=[user_id])
  267. return {}
  268. @defer.inlineCallbacks
  269. def invite(self, group_id, user_id, requester_user_id, config):
  270. """Invite a user to a group
  271. """
  272. content = {"requester_user_id": requester_user_id, "config": config}
  273. if self.is_mine_id(group_id):
  274. res = yield self.groups_server_handler.invite_to_group(
  275. group_id, user_id, requester_user_id, content
  276. )
  277. else:
  278. res = yield self.transport_client.invite_to_group(
  279. get_domain_from_id(group_id),
  280. group_id,
  281. user_id,
  282. requester_user_id,
  283. content,
  284. )
  285. return res
  286. @defer.inlineCallbacks
  287. def on_invite(self, group_id, user_id, content):
  288. """One of our users were invited to a group
  289. """
  290. # TODO: Support auto join and rejection
  291. if not self.is_mine_id(user_id):
  292. raise SynapseError(400, "User not on this server")
  293. local_profile = {}
  294. if "profile" in content:
  295. if "name" in content["profile"]:
  296. local_profile["name"] = content["profile"]["name"]
  297. if "avatar_url" in content["profile"]:
  298. local_profile["avatar_url"] = content["profile"]["avatar_url"]
  299. token = yield self.store.register_user_group_membership(
  300. group_id,
  301. user_id,
  302. membership="invite",
  303. content={"profile": local_profile, "inviter": content["inviter"]},
  304. )
  305. self.notifier.on_new_event("groups_key", token, users=[user_id])
  306. try:
  307. user_profile = yield self.profile_handler.get_profile(user_id)
  308. except Exception as e:
  309. logger.warn("No profile for user %s: %s", user_id, e)
  310. user_profile = {}
  311. return {"state": "invite", "user_profile": user_profile}
  312. @defer.inlineCallbacks
  313. def remove_user_from_group(self, group_id, user_id, requester_user_id, content):
  314. """Remove a user from a group
  315. """
  316. if user_id == requester_user_id:
  317. token = yield self.store.register_user_group_membership(
  318. group_id, user_id, membership="leave"
  319. )
  320. self.notifier.on_new_event("groups_key", token, users=[user_id])
  321. # TODO: Should probably remember that we tried to leave so that we can
  322. # retry if the group server is currently down.
  323. if self.is_mine_id(group_id):
  324. res = yield self.groups_server_handler.remove_user_from_group(
  325. group_id, user_id, requester_user_id, content
  326. )
  327. else:
  328. content["requester_user_id"] = requester_user_id
  329. res = yield self.transport_client.remove_user_from_group(
  330. get_domain_from_id(group_id),
  331. group_id,
  332. requester_user_id,
  333. user_id,
  334. content,
  335. )
  336. return res
  337. @defer.inlineCallbacks
  338. def user_removed_from_group(self, group_id, user_id, content):
  339. """One of our users was removed/kicked from a group
  340. """
  341. # TODO: Check if user in group
  342. token = yield self.store.register_user_group_membership(
  343. group_id, user_id, membership="leave"
  344. )
  345. self.notifier.on_new_event("groups_key", token, users=[user_id])
  346. @defer.inlineCallbacks
  347. def get_joined_groups(self, user_id):
  348. group_ids = yield self.store.get_joined_groups(user_id)
  349. return {"groups": group_ids}
  350. @defer.inlineCallbacks
  351. def get_publicised_groups_for_user(self, user_id):
  352. if self.hs.is_mine_id(user_id):
  353. result = yield self.store.get_publicised_groups_for_user(user_id)
  354. # Check AS associated groups for this user - this depends on the
  355. # RegExps in the AS registration file (under `users`)
  356. for app_service in self.store.get_app_services():
  357. result.extend(app_service.get_groups_for_user(user_id))
  358. return {"groups": result}
  359. else:
  360. bulk_result = yield self.transport_client.bulk_get_publicised_groups(
  361. get_domain_from_id(user_id), [user_id]
  362. )
  363. result = bulk_result.get("users", {}).get(user_id)
  364. # TODO: Verify attestations
  365. return {"groups": result}
  366. @defer.inlineCallbacks
  367. def bulk_get_publicised_groups(self, user_ids, proxy=True):
  368. destinations = {}
  369. local_users = set()
  370. for user_id in user_ids:
  371. if self.hs.is_mine_id(user_id):
  372. local_users.add(user_id)
  373. else:
  374. destinations.setdefault(get_domain_from_id(user_id), set()).add(user_id)
  375. if not proxy and destinations:
  376. raise SynapseError(400, "Some user_ids are not local")
  377. results = {}
  378. failed_results = []
  379. for destination, dest_user_ids in iteritems(destinations):
  380. try:
  381. r = yield self.transport_client.bulk_get_publicised_groups(
  382. destination, list(dest_user_ids)
  383. )
  384. results.update(r["users"])
  385. except Exception:
  386. failed_results.extend(dest_user_ids)
  387. for uid in local_users:
  388. results[uid] = yield self.store.get_publicised_groups_for_user(uid)
  389. # Check AS associated groups for this user - this depends on the
  390. # RegExps in the AS registration file (under `users`)
  391. for app_service in self.store.get_app_services():
  392. results[uid].extend(app_service.get_groups_for_user(uid))
  393. return {"users": results}